Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-32715: Self Cross-Site Scripting (XSS) on Splunk App for Lookup File Editing

In the Splunk App for Lookup File Editing versions below 4.0.1, a user can insert potentially malicious JavaScript code into the app, which causes that code to run on the user’s machine. The app itself does not contain the potentially malicious JavaScript code. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser, and requires additional user interaction to trigger. The attacker cannot exploit the vulnerability at will.

CVE
#xss#vulnerability#web#mac#java

Advisory ID: SVD-2023-0610

Published: 2023-06-01

Last Update: 2023-06-01

CVSSv3.1 Score: 4.7, Medium

Description

A user can insert potentially malicious JavaScript code into the Splunk App for Lookup File Editing, which causes the code to run on the user’s machine.

Solution

Upgrade the Splunk App for Lookup Editing to version 4.0.1 or higher.

Product Status

Product

Version

Component

Affected Version

Fix Version

Splunk App for Lookup File Editing

4.0

4.0 and lower

4.0.1

Mitigations and Workarounds

Disable the Splunk App for Lookup File Editing if you do not require it and cannot upgrade it. If users do not log in to Splunk Web on indexers in a distributed environment, disable Splunk Web on those indexers. See Disable unnecessary Splunk Enterprise components and the web.conf configuration specification file in the Splunk documentation for more information on disabling Splunk Web.

Detections

None

Severity

Splunk rated this vulnerability as Medium, 4.7, with a CVSSv3.1 vector of CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907